Google security researcher Ian Beer, who works for the Project Zero team, last week details about an iOS 11 exploit called “tfp0,” which he believes could be the basis for a future jailbreak of all Apple devices running iOS 11.1.2 or below, though he only personally tested iPhone , iPhone 6s, and a sixth-generation iPod touch.

The revelation made on Twitter left the infosec community inflamed and curious.

On Monday (11 December), Beer Beer published details of an R;async_wake’ exploit, the proof of concept and tweeted that he tested out the exploit on iPhone 7, iPhone 6s and iPod touch 6G, adding that “adding more should be easy”.

As detailed in Project Zero’s bug repository, the issue Beer found relates to a memory flaw in IOSurface, a kernel extension.

It appears what Beer has isn’t a full jailbreak but enough to allow security to bypass software restrictions imposed by Apple and test a newish version of iOS.

iOS 11.1.2 is no longer the current version of iOS as Apple released iOS 11.2 on December 2, but Apple is still signing iOS 11.1.2 at this time. Apple will likely stop signing the older update in the near future, and its end could come sooner now that further information on the tfp0 exploit has been released.

iOS are rare and the iPhone is still considered to be one of the hardest consumer devices to hack and/or jailbreak. This makes Beer’s exploit all the more valuable. In the past, researchers have been known to sell iOS for significant amounts of cash. Companies such as Zerodium, that sell such , has previously offered up to $1.5 million bounties to hackers who could find iOS zero-day .

Jailbreaking iOS devices have dwindled in popularity in recent years, which has led two major Cydia repositories to close. Both ModMy and ZodTTD/MacCiti, which provided apps, themes, tweaks, and more for jailbroken iOS devices, shut down in November. For the time being, iOS 11 continues to be the only major version of iOS that has not been jailbroken.

Source link

No tags for this post.


Please enter your comment!
Please enter your name here